Module 7 Cybercrimes
Module 7 Cybercrimes
December 2020
TABLE OF CONTENTS
INTRODUCTION .................................................................................................................. 1
WHAT IS A CYBERCRIME? ................................................................................................ 2
Definition ........................................................................................................................... 2
Cybercrimes in international law ........................................................................................ 3
Cybercrimes in domestic law ............................................................................................. 4
TYPES OF CYBERCRIMES ................................................................................................. 4
Data privacy violations....................................................................................................... 4
Criminalisation of online speech ........................................................................................ 5
Cyberstalking and online harassment ................................................................................ 6
Other violations ................................................................................................................. 9
Cyberbullying..................................................................................................................... 9
TRENDS IN AFRICA .......................................................................................................... 11
STEPS TO TAKE IN RESPONSE TO ONLINE HARMS .................................................... 12
Actions taken by state actors ........................................................................................... 12
Actions taken by non-state actors .................................................................................... 12
CONCLUSION .................................................................................................................... 13
Module 7: Cybercrimes
MODULE 7
CYBERCRIMES
However, laws which regulate criminal activity on the internet are increasingly
providing tools for the state to suppress dissent and the media.
Despite the limited adoption of the Malabo Convention, data privacy is starting to
attract more widespread attention across the continent, with many countries
recently passing new data protection acts.
There are, however, various practical steps that can be taken to address online
harms, and ensure that fundamental rights are equally protected both off- and
online.
INTRODUCTION
The increase in internet access in the recent past has created a number of new legal
challenges. While the internet is transnational, amorphous, and difficult to define, the new
landscape created by the digital world has often confounded the law when it comes to
protecting fundamental rights in the digital age. Old definitions about what constitutes a
publisher or a journalist are increasingly complicated; overcoming the anonymity afforded by
many internet platforms can be a difficult, if not impossible, endeavour; and there are serious
questions about who is liable for content shared online that may affect multiple parties in
different jurisdictions in some way.
Regulating and legislating crimes that occur on, or relate to, the internet has been a difficult
undertaking for states and international bodies. It is estimated that African economies lost
$3.5 billion in 2017 due to cybercrimes,1 and Africa accounts for 10% of the total global cyber
1
Module 7: Cybercrime
incidents.2 Without adequate regulatory frameworks and protections, the growth of internet
access, e-commerce, and economic development may lead to increased instances of
cybercrimes.
In Africa, where the number of new internet users continues to grow at a rapid rate, the
increase in access to the internet and information and communications technologies (ICTs)
has also led to increased violations of users’ rights. Laws to regulate criminal activity on the
internet are increasingly providing tools for the state to suppress dissent or to punish critics
and independent media because of their often vague and overly broad nature.
As far back as 2011, the United Nations (UN) Special Rapporteur on freedom of expression
warned that:
WHAT IS A CYBERCRIME?
Definition
There is no precise, universal definition of the term ‘cybercrime’. In general terms, it refers to
a crime that is committed using a computer network or the internet.4 This can cover a wide
range of activities, including terrorist activities and espionage conducted with the help of the
internet and illegal hacking into computer systems, content-related offences, theft and
manipulation of data, and cyberstalking.5
Cybercrimes and cybersecurity are two issues that cannot be separated in an interconnected
digital environment. Cybersecurity, or the management of cybercrimes, refers to the collection
of tools, policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies that can be used to
protect the cyber-environment and organisational and user’s assets, such as computing
devices, applications and telecommunication systems.6
2 African Union, ‘A global approach on Cybersecurity and Cybercrime in Africa’ at p 9 (accessible at:
https://au.int/sites/default/files/newsevents/workingdocuments/31357-wd-
a_common_african_approach_on_cybersecurity_and_cybercrime_en_final_web_site_.pdf).
3 United Nations General Assembly, Human Rights Council, 17 th Session, ‘Report of the Special
https://www.itu.int/en/ITUT/studygroups/com17/Pages/cybersecurity.aspx).
2
Module 7: Cybercrime
The African Union (AU) has sought to encourage a continent-wide approach to tackling
cybercrimes through the Convention on Cyber Security and Personal Data Protection (known
as the Malabo Convention).7 Because of the cross-border and international nature of
cybercrimes, the AU argues that “national legislation cannot be drafted in isolation and national
governments must seek to harmonize national legislation, regulations, standards and
guidelines on Cybersecurity issues.”8 However, even the AU itself was the target of a major
cyberattack between 2013 and 2017,9 and the Malabo Convention has been criticised for
using vague language which may be open to abuse by states. An example is the provision
that criminalises the use of insulting language.10
Article 25 of the Malabo Convention calls on states to adopt legislation and/or regulatory
measures to prosecute cybercrimes. Nevertheless, the text is clear that such legislation
should not infringe on fundamental rights and freedoms:
“In adopting legal measures in the area of cybersecurity and establishing the framework
for implementation thereof, each State Party shall ensure that the measures so adopted
will not infringe on the rights of citizens guaranteed under the national constitution and
internal laws, and protected by international conventions, particularly the African Charter
on Human and Peoples’ Rights, and other basic rights such as freedom of expression,
the right to privacy and the right to a fair hearing, among others.” 11
The UN General Assembly Resolution on the Creation of a global culture of cyber security
also states that:
The Convention on Cybercrime of the Council of Europe (CETS No.185), known as the
Budapest Convention, is the only binding international instrument on cybercrime, and
serves as a useful guideline for countries developing cybercrimes legislation.13
7 Institute for Security Studies, Karen Allen ‘Is Africa cybercrime savvy?’ (2019) (accessible at:
https://issafrica.org/iss-today/is-africa-cybercrime-savvy).
8 African Union above n 2 at p 3.
9 Le Monde, ‘A Addis-Abeba, le siège de l’Union africaine espionné par Pékin’ (2018) (accessible at:
https://www.lemonde.fr/afrique/article/2018/01/26/a-addis-abeba-le-siege-de-l-union-africaine-
espionne-par-les-chinois_5247521_3212.html).
10 African Union ‘Convention on Cyber Security and Personal Data Protection’ Article 3(g) (2014)
https://www.coe.int/en/web/cybercrime/the-budapest-convention).
3
Module 7: Cybercrime
Cybercrime legislation has proliferated across Africa in recent years, but only eight states
ratified the Malabo Convention which requires fifteen ratifications to enter into force.14
In order to ensure that cybercrimes laws do not unnecessarily infringe on the fundamental
rights to freedom of expression, privacy and access to information, they should meet the
following criteria:
TYPES OF CYBERCRIMES
The use of data, including the volume of cross-border data flows, is increasing every year,
particularly in relation to personal data. However, there is a lack of adequate regulations for
the collection and processing of personal information which can have significant ramifications,
making data protection regulations critical. At least fourteen African countries currently have
data protection laws in place,16 but their comprehensiveness and effectiveness varies
significantly. Some of the most recently passed laws were in Kenya and the Togolese
Republic, which were signed into law in November and October 2019 respectively. 17
Countries such as South Africa and Morocco have successfully set up Data Protection
Authorities (DPAs) to enforce data protection regulations and investigate violations, though
many such DPAs still suffer from a lack of funding and political support, leading to a lack of
proper enforcement.
The rise of sophisticated surveillance technologies and the use of biometric technologies
without proper safeguards are just some of the many threats to the right to privacy across
Africa. There have, however, been some encouraging judgments in recent years pointing to
the willingness of judiciaries around Africa to protect the right to privacy.
14 African Union, ‘List of countries which have signed, ratified/acceded to the African Union
Convention on cyber security and personal data protection’ (2020) (accessible at:
https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection).
15 Media Defence, ‘Training manual on digital rights and freedom of expression online, at pp 62 (2020)
4
Module 7: Cybercrime
In Kenya, the High Court in Nairobi ruled in 2020 in Nubian Rights Forum and Others v The
Hon. Attorney General and Others18 that the government could not implement a new
comprehensive digital identity system without an adequate data protection law being in place.
On surveillance, the High Court of South Africa found in the case of amaBhungane and
Another v Minister of Justice and Correctional Services and Others19 in 2019 that mass
surveillance and the interception of communications by the National Communications Centre
were unlawful, and declared certain sections of the Regulation of Interceptions of
Communications and Provision of Communication Related Information Act (RICA)
unconstitutional.
These developments follow the rapid development of data protection legislation around the
world since the entry into force of the European Union’s General Data Protection Regulations
(GDPR) in 2018. The GDPR has set a new standard for the protection of personal data online,
and has served as a template for numerous other countries’ legislation. The California
Consumer Privacy Act (CCPA) likewise has set sweeping regulations regarding consumers’
rights to know what personal information is being collected from them, to request deletion of
their data, and to opt out of data collection.20 Because of its application to the technology
sector of Silicon Valley, the CCPA has also been lauded for advancing the state of data
protection globally.21
Cybercrimes legislation usually seeks to deal with a wide range of illegal or harmful content
that is posted online. This may include terrorist propaganda, racist content, hate speech,
sexually explicit content such as child pornography, blasphemous content, content critical of
states and their institutions and content unauthorised by intellectual property rights holders.22
This is often the area in which such legislation most conflicts with the right to freedom of
expression and the right to information. The UN Special Rapporteur on Freedom of
Expression stated in 2011 that the only types of expression that states may prohibit under
international law are: (a) child pornography; (b) direct and public incitement to commit
genocide; (c) hate speech; (d) defamation; and (e) incitement to discrimination, hostility or
violence.23 Even legislation that does criminalise these forms of expression needs to be
precise, have adequate and effective safeguards against abuse or misuse, and include
18 High Court of Kenya in Nairobi, Consolidated petitions no. 56, 58 & 59 of 2019, (2020) (accessible
at: http://kenyalaw.org/caselaw/cases/view/189189/).
19 High Court of South Africa in Pretoria, Case No. 25978/2017, (2019) (accessible at:
http://www.saflii.org/za/cases/ZAGPPHC/2019/384.html).
20 Forbes, ‘California Begins Enforcing Broad Data Privacy Law – Here’s What You Should Know’
content/uploads/2018/02/FoE-and-ICTs.pdf).
23 United Nationals Special Rapporteur on the Right to Freedom of Opinion and Expression, Frank La
5
Module 7: Cybercrime
oversight and review by an independent and impartial tribunal or regulatory body. 24 In 2018,
the Special Rapporteur stated that “[b]roadly worded restrictive laws on “extremism”,
blasphemy, defamation, “offensive” speech, “false news” and “propaganda” often serve as
pretexts for demanding that companies suppress legitimate discourse.”25
In Zimbabwe, for example, the Cyber Security and Data Protection Bill was published in the
Zimbabwean Government Gazette shortly after extensive public protests had taken place over
rising fuel and commodity prices in the country. It is intended to consolidate cyber-related
offences and provide for data protection and seeks to “create a technology-driven business
environment and encourage technological development and the lawful use of technology.” 26
However, the Bill has been widely criticised as being a tool for the Zimbabwean government
to stifle freedom of expression, access to information, promote interference of private
communications and data, and use search and seizure powers to access the information of
activists in order to quell protests.27 MISA-Zimbabwe has criticised the Bill for:
For more on the criminalisation of online speech, see Module 3 of Media Defence’s Advanced
Modules on Digital Rights and Freedom of Expression Online.
Online harassment is becoming increasingly prevalent with the spread of social media, which
can provide especially fertile ground for online harassment. Cyberstalking is undue
harassment and intimidation online through text messages, phone calls or social media, and
it severely restricts the enjoyment that persons have of their rights online, particularly
vulnerable and marginalised groups, including women and members of sexual minorities.
Research has shown that online harassment is often focused on personal or physical
characteristics, with political views, gender, physical appearance and race being among the
most common.29 Furthermore, women encounter sexualised forms of online harassment at
much higher rates than men.30
24 Id at para. 71.
25 United Nations Special Rapporteur on the Right to Freedom of Opinion and Expression, (2018)
para 13 (accessible at: https://freedex.org/wp-content/blogs.dir/2015/files/2018/05/G1809672.pdf.)
26 ALT Advisory Africa, ‘Zimbabwe gazettes Cyber Security and Data Protection Bill’ (2020)
https://www.pewresearch.org/internet/2017/07/11/online-harassment-2017/).
30 Id.
6
Module 7: Cybercrime
A particular form of online harassment that has emerged as a concerning new trend is that
of private and sexually explicit images, mostly of women, being shared publicly online
without their permission or consent, often by former partners in retaliation for a break-up or
other falling out, or for the purposes of extortion, blackmail or humiliation. However, few
countries’ cybercrime legislation specifically caters for offences related to non-consensual
dissemination of intimate images (NCII), often leaving victims with little recourse against
perpetrators.31
South Africa is an exception, having passed the Film and Publications Board Amendment
Act32 in 2019 which, for the first time, explicitly criminalised the practice of non-consensual
dissemination of intimate images, stating that:
“[A]ny person who knowingly distributes private sexual photographs and films in any
medium including through the internet, without prior consent of the individual or
individuals and where the individual or individuals in the photographs or films is
identified or identifiable in the said photographs and films, shall be guilty of an offence
and liable upon conviction.”33
Make a record (and copies) of the content posted online, to ensure permanent
documentation of the crime. This should include the date the content was posted,
where it was posted, and who posted it. Screenshots are a useful way to do this.
Seek psycho-social and legal assistance. (You may be able to interdict the further
dissemination of images or video.)34
File a report with the police. Even if your country does not have a specific provision
for the non-consensual dissemination of intimate images, an offence may be located
within the existing criminal law.
File a report with the platform on which the content was posted. It might also help to
include a copy of the police report in your report to the platform.35
31 For example, although legislation in both Malawi and Uganda includes anti-pornography and anti-
obscenity provisions, neither cater specifically to NCII situations, often leaving victims with little
recourse. For more see Chisala-Tempelhoff and Kirya, ‘Gender, law and revenge porn in Sub-
Saharan Africa: a review of Malawi and Uganda’ (2016) (accessible at:
https://www.nature.com/articles/palcomms201669).
32 South Africa Film and Publications Board Amendment Act, 2019 (accessible at:
https://static.pmg.org.za/Films_and_Publications_Act.pdf).
33 Ibid at section 24(E).
34 See Case number A3032-2016 in the High Court of South Africa for reference (2017) (accessible
at: http://www.saflii.org/za/cases/ZAGPJHC/2017/297.html).
35 News24, Oberholzer, ‘What to do if you’re a victim of revenge porn & image-based abuse,’ (2020)
7
Module 7: Cybercrime
Many stalking crimes begin online before moving offline,39 and cyberstalking can be
complicated for many reasons:
“[Cyberstalking is] online harassment, threats, intimidating messages and subscribing the
victim to unwanted online services. From the outset this interaction may be considered
an irritation or an annoyance or may give rise to a belief that harm may be caused. The
cyber-stalker may however initiate contact in a non-confrontational manner and proceed
to woo or groom the victim into a cyber-friendship in order to gain the victim’s confidence
and to determine personal details such as the person’s address. Without the victim’s
knowledge the same “cyber-friend” could be stalking the victim in person, perhaps even
giving the victim advice on how he or she should respond to the stalker. Although
cyberstalking which has escalated into stalking the victim in person i.e. “real-time stalking”
may result in the commission of a sexual offence, it is not the only outcome.” 40
Because of this complexity, as well as the rapid evolution of technology that makes it difficult
for regulation to keep up, the South African Law Reform Commission recommended that
specific reference to cyberstalking not be included explicitly in law:
Ongoing harassment and attacks on members of the media have also become a particularly
worrying trend.
36 GenderIT, ‘"Revenge Porn": 5 important reasons why we should not call it by that name’ (2019)
(accessible at: https://www.genderit.org/articles/5-important-reasons-why-we-should-not-call-it-
revenge-porn).
37 Id.
38 Association for Progressive Communications, ‘Online gender-based violence: A submission from
the Association for Progressive Communications to the United Nations Special Rapporteur on
violence against women, its causes and consequences’ (2017) at p.21 (accessible at:
https://www.apc.org/sites/default/files/APCSubmission_UNSR_VAW_GBV_0_0.pdf)).
39 South Africa Law Reform Commission, ‘Report on Stalking,’ (2006) (accessible at:
https://www.justice.gov.za/salrc/reports/r_pr130_stalking.pdf).
40 Id at p 182.
41 Id at p 183.
8
Module 7: Cybercrime
Where journalists allege imminent threats to their safety, courts are empowered to grant
interdictory relief in appropriate circumstances and subject to the relevant legal
requirements.
For instance, in the matter of South African National Editors Forum and Others v Black Land
First and Others,42 the High Court of South Africa granted an interdict in favour of the media
broadly, in terms of which the respondents were interdicted from “engaging in any of the
following acts directed towards the applicants: intimidation; harassment; assaults; threats;
coming to their homes; or acting in any manner that would constitute an infringement of
their personal liberty”, and from “making any threatening or intimidating gestures on social
media… that references any violence, harm and threat.”43
Cyberbullying
It is also worth noting the crime of cyberbullying, which is the sending of intimidating or
threatening messages, often via social media, and which is pervasive among children and
young adult.44 According to the United Nations Children’s Fund (UNICEF):
“[Cyberbullying] can take place on social media, messaging platforms, gaming platforms
and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming
those who are targeted. Examples include:
Face-to-face bullying and cyberbullying can often happen alongside each other. But
cyberbullying leaves a digital footprint — a record that can prove useful and provide
evidence to help stop the abuse.” 45
The scale of the problem is significant and growing. A study by UNICEF and the UN Special
Representative of the Secretary-General (SRSG) on Violence against Children found that one
in three young people in 30 countries reported being a victim of online bullying.46
42 High Court of South Africa in Johannesburg, Case No 23897/17, (2017) (accessible at:
http://www.saflii.org/za/cases/ZAGPJHC/2017/179.html).
43 Ibid at para. 29.
44 News24, above at no. 35. For more on online harassment see pp. 38-44 of Module 4 of Media
Defence’s Advanced Modules on Digital Rights and Freedom of Expression Online accessible at:
https://www.mediadefence.org/ereader/publications/advanced-modules-on-digital-rights-and-freedom-
of-expression-online/module-4-privacy-and-security-online/).
45 UNICEF, ‘Cyberbullying: What is it and how to stop it’ (accessible at: https://www.unicef.org/end-
violence/how-to-stop-cyberbullying).
46 UNICEF, ‘UNICEF poll: More than a third of young people in 30 countries report being a victim of
9
Module 7: Cybercrime
In South Africa, the family of a teenager who was sent graphic threats through Instagram
from an anonymous account, has pitted them against one of the largest technology
companies in the world, Facebook, the owner of Instagram.47 The girl, who has reason to
believe the threats are from someone attending her school, fears for her physical safety and
has therefore been attempting to force Facebook to release the identity of the person behind
the anonymous account sending the threats. Multiple attempts to do so were futile, forcing
the family to turn to the courts for relief. The case is an interesting example of challenges
in holding multi-national companies to account in the digital age, and raises questions about
how far their responsibility to protect children who use their platforms should go.
Other violations
Given that the Malabo Convention has yet to be tested in practice, a reading of the Budapest
Convention on Cybercrime, the first international treaty that seeks to address internet and
computer crimes, is instructive.48 It is increasingly being used in Africa, and has served as a
guideline or source for more than 80% of states around the world to develop domestic
cybercrimes laws.49 It is also open for any state willing to implement its provisions to join, and
can be ratified by African countries.50
Although these definitions date to 2001, much of what constitute cybercrimes today is still
covered by these categories and provisions.
47 Daily Maverick, ‘Anonymously threatened with gang rape and murder, SA teenager takes Facebook
Inc to court to disclose perpetrator’ (2020) (accessible at:
https://www.dailymaverick.co.za/article/2020-07-24-anonymously-threatened-with-gang-rape-and-
murder-sa-teenager-takes-facebook-inc-to-court-to-disclose-perpetrator/).
48 Council of Europe, ‘The State of Cybercrime Legislation in Africa – an Overview’ at p. 2 (2015)
https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures).
51 Council of Europe above n 48 at p 8.
1
0
Module 7: Cybercrime
TRENDS IN AFRICA
“[T]he rapid pace of innovation in the ICT sector can result in gaps in the legislative and
regulatory cybersecurity framework since the challenge for the legislator is the delay in
the recognition of the new types of offences and the adoption of amendments to the
applicable legislation.”52
As a result, many African governments have been keenly adopting new cybercrimes
legislation in an attempt to keep pace and to continue to protect against crimes committed
online. There are currently at least 41 African states that have basic cybercrimes legislation
either fully or partially in place, though many are missing implementing regulations.53
For example, Nigeria’s Cybercrime Act of 2015 has been widely criticised for being used to
suppress dissent and silence the media.55 The Committee to Protect Journalists states that
in just the first year of the law being in force, five bloggers who criticised politicians and
businesspeople online and through social media were accused of the crime of cyberstalking
under the new law, which carries a fine of up to 7 million naira (USD$22 000) and a maximum
jail term of three years. According to Paradigm Initiative Nigeria, it gives law enforcement
“extensive powers to hold personal data without corresponding liability” and has “no
provision… to seek redress.”56 It also makes the all-too-common error of using vaguely
defined “national security” as a justification for outlawing a wide range of online activities.57
Other common problematic clauses in cybercrimes legislation include those that criminalise
the “creation of sites with a view to disseminating ideas and programmes contrary to public
http://www.orderpaper.ng/nigerian-cybercrimes-act-2015-uhuru-yet/).
1
1
Module 7: Cybercrime
In the case of Andare v Attorney General of Kenya,59 the High Court of Kenya emphasised
that the state has a duty to demonstrate that cybercrimes laws are permissible in a free and
democratic society, to establish the relationship between the limitation and its purpose, and to
show that there were no less restrictive means to achieve the purpose intended.60
Unfortunately, too few states in Africa have so far taken this approach.
This section lays out practical approaches to dealing with various online harms.
Tell the story and engage in advocacy. While ensuring that the identity of the victim
or survivor is fully protected, identify the online harms committed and brief the press and
start an advocacy campaign. Too often, reportage is limited in terms of the perpetration
of online harms which enables these practices to grow.
Consider domestic legal challenges. Many cybercrimes laws in Africa arguably
breach fundamental rights and freedoms, especially in their vagueness and generality.
In such cases, recourse to the courts may provide relief, especially in constitutional
democracies. In cases where existing legislation does not cater specifically for crimes
committed online, there may be an opportunity to apply or develop existing laws, such
as those found with existing criminal laws.
Approach regional courts. In cases where cybercrimes legislation is being used to
unjustly violate rights and freedoms and domestic courts are not amenable, there may
be recourse in regional human rights courts such as the ECOWAS Community Court of
Justice, the East African Court of Justice, or the African Court on Human and Peoples’
Rights, if jurisdiction can be established. These courts have jurisdiction to determine
State compliance with regional human rights agreements and related legal
instruments.61
58 Id at p 8.
59 High Court of Kenya at Nairobi, Petition No. 149 of 2015 (2015) (accessible at:
http://kenyalaw.org/caselaw/cases/view/121033/).
60 See also, Shreyal Singh v India, Writ 167 of 2012 (accessible at:
https://globalfreedomofexpression.columbia.edu/wp-
content/uploads/2015/06/Shreya_Singhal_vs_U.O.I_on_24_March_2015.pdf).
61 International Justice Resource Center, ‘Courts and Tribunals of Regional Economic Communities,’
1
2
Module 7: Cybercrime
CONCLUSION
Although the rise of cybercrimes must be addressed, a growing trend of using cybercrimes
legislation to clamp down on dissent and free speech is deeply concerning. While the internet
is a rapidly evolving space, legislation can and should be designed to include specific
protections for online harms both at an individual level, such as cyberstalking, and at a societal
level, such as regulating the flow and use of personal data. Social media companies also
have a role to play in ensuring that their platforms are not used for the distribution of illegal
and harmful content. More generally, there is a need for countries in Africa to collaborate on
an approach to tackling cybercrimes which are frequently transnational in nature.
62 Department of Justice and Constitutional Development, Protection from Harassment Act, 2011 (Act
17 of 2011 (accessible at: https://www.justice.gov.za/forms/form_pha.html).
63 Complaints platforms are available:
Facebook: https://www.facebook.com/help/263149623790594;
Instagram: https://help.instagram.com/192435014247952;
Twitter: https://help.twitter.com/en/rules-and-policies/twitter-report-
violation#:~:text=Open%20the%20profile%20you'd,the%20issue%20you're%20reporting;
YouTube:
https://support.google.com/youtube/answer/2802027?co=GENIE.Platform%3DAndroid&hl=en-GB;
and
TikTok: https://support.tiktok.com/en/privacy-safety/report-inappropriate-content-default.
1
3